2021
DOI: 10.1109/tmc.2019.2960778
|View full text |Cite
|
Sign up to set email alerts
|

Stealing Your Android Patterns via Acoustic Signals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…Therefore, the attacker cannot bypass our liveness detection by replaying pre-recorded audio that was collected during previous rounds of detection. Note that, most people cannot hear the tone whose frequency is higher than 18KHz [47] and the performance of acoustic components in some smartphones decreases significantly when the frequency is higher than 21KHz [48]. Thus, we set f i in the range of 18 ∼ 21KHz.…”
Section: Audio Capturingmentioning
confidence: 99%
“…Therefore, the attacker cannot bypass our liveness detection by replaying pre-recorded audio that was collected during previous rounds of detection. Note that, most people cannot hear the tone whose frequency is higher than 18KHz [47] and the performance of acoustic components in some smartphones decreases significantly when the frequency is higher than 21KHz [48]. Thus, we set f i in the range of 18 ∼ 21KHz.…”
Section: Audio Capturingmentioning
confidence: 99%
“…When the display technology was improved, some researchers also aimed at monitoring video displays by both electromagnetic and optical emanations [22][23][24]. The latest research can even eavesdrop from a cell phone screen or from tablet screen [25][26][27][28]. The work presented in [25], the authors presents a side-channel attack to retrieve PIN from a cell phone screen.…”
Section: Emission Security and Side-channel Analysismentioning
confidence: 99%
“…The authors report that to successfully infer the character or digit tap information, the distance between the victim and adversary needs to be less than 60 cm. However, in [27], the authors present acoustic side-channel attack to retrieve the lock patters by using the mic embedded in an android cell phones. The authors use a cellphone application to record the emanations of lock pattern and used to noise rejection filter, signal segmentation, relative movement measurement to infer the pattern of the fingertips.…”
Section: Emission Security and Side-channel Analysismentioning
confidence: 99%
“…Consequently, it is conceivable that such unauthorized audio recording can be used to recover sensitive user information, using inter-keystroke timing or statistical analysis to recover typed text [7] or even ten-character passwords within 20 attempts [8]. While some practitioners may dismiss the use of acoustic signals as a possible security loophole on mobile devices [9], recent publications [10][11][12][13][14] show that acoustic techniques such as tracking the Doppler effect, supplying an external excitation signal and Time Difference of Arrival (TDOA) that can be used to retrieve text input on physical keyboard can be adapted to compromise mobile devices as well. One such system, SonarSnoop utilises an active acoustic technique by emitting human inaudible acoustic signals and recording the echo to profile user interaction and infer touchscreen unlock patterns [14].…”
Section: Introductionmentioning
confidence: 99%